Chapter 3. Wireless and Mobile
So I don't think it's possible to go to a conference these days and not see a talk on mobile or wireless. (They tend to schedule the streams to have both mobile and wireless talks at the same time—the sneaky devils. There is no escaping the wireless knowledge!) So, it makes sense that we work out some ways of training people how to skill up on these technologies. We're going to touch on some older vulnerabilities that you don't see very often, but as always, when you do, it's good to know how to insta-win.
In this chapter, we will specifically focus on the following topics:
- Prerequisites for this chapter
- Network setup
- In-depth setup of a WEP network and dummy traffic
- In-depth setup of a WPA-2 network for handshake capture
- In-depth setup of vulnerable phones and devices
- In-depth setup of a secondary vulnerable phone scenario
- Exploit guides for all scenarios